default search action
Shai Halevi
Person information
- affiliation: IBM Research, Yorktown Heights, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j20]Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. J. Cryptol. 38(1): 5 (2025) - 2024
- [c117]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. EUROCRYPT (5) 2024: 62-91 - [i112]Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Gold OPRF: Post-Quantum Oblivious Power Residue PRF. IACR Cryptol. ePrint Arch. 2024: 1955 (2024) - 2023
- [c116]Fabrice Benhamouda, Shai Halevi, Lev Stambler:
Weighted Secret Sharing from Wiretap Channels. ITC 2023: 8:1-8:19 - [c115]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. CRYPTO (1) 2023: 203-235 - [c114]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-encryption from CPA. TCC (2) 2023: 279-305 - [i111]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. IACR Cryptol. ePrint Arch. 2023: 427 (2023) - [i110]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. IACR Cryptol. ePrint Arch. 2023: 870 (2023) - [i109]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-Encryption from CPA. IACR Cryptol. ePrint Arch. 2023: 1443 (2023) - 2022
- [c113]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. WAHC@CCS 2022: 53-63 - [c112]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). CCS 2022: 323-336 - [c111]Craig Gentry, Shai Halevi, Vadim Lyubashevsky:
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties. EUROCRYPT (1) 2022: 458-487 - [c110]Shai Halevi, Eyal Kushilevitz:
Random-Index Oblivious RAM. TCC (3) 2022: 33-59 - [c109]Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. TCC (2) 2022: 70-99 - [i108]Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 282 (2022) - [i107]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. IACR Cryptol. ePrint Arch. 2022: 915 (2022) - [i106]Shai Halevi, Eyal Kushilevitz:
Random-Index Oblivious RAM. IACR Cryptol. ePrint Arch. 2022: 982 (2022) - [i105]Fabrice Benhamouda, Shai Halevi, Lev Stambler:
Weighted Secret Sharing from Wiretap Channels. IACR Cryptol. ePrint Arch. 2022: 1578 (2022) - 2021
- [j19]Shai Halevi, Victor Shoup:
Bootstrapping for HElib. J. Cryptol. 34(1): 7 (2021) - [j18]Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Secure Multi-party Computation. J. Cryptol. 34(3): 19 (2021) - [c108]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [c107]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-Index PIR and Applications. TCC (3) 2021: 32-61 - [c106]Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof:
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation. TCC (2) 2021: 129-161 - [i104]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i103]Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof:
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1223 (2021) - [i102]Craig Gentry, Shai Halevi, Vadim Lyubashevsky:
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties. IACR Cryptol. ePrint Arch. 2021: 1397 (2021) - 2020
- [c105]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - [i101]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020) - [i100]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-index PIR with Applications to Large-Scale Secure MPC. IACR Cryptol. ePrint Arch. 2020: 1248 (2020) - [i99]Shai Halevi, Victor Shoup:
Design and implementation of HElib: a homomorphic encryption library. IACR Cryptol. ePrint Arch. 2020: 1481 (2020)
2010 – 2019
- 2019
- [j17]Fabrice Benhamouda, Shai Halevi, Tzipora Halevi:
Supporting private data on Hyperledger Fabric with secure multiparty computation. IBM J. Res. Dev. 63(2/3): 3:1-3:8 (2019) - [j16]Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. Proc. Priv. Enhancing Technol. 2019(3): 87-107 (2019) - [c104]Flávio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. ACNS 2019: 592-611 - [c103]Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. ASIACRYPT (2) 2019: 473-502 - [c102]Tzipora Halevi, Fabrice Benhamouda, Angelo De Caro, Shai Halevi, Charanjit S. Jutla, Yacov Manevich, Qi Zhang:
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation. Blockchain 2019: 91-98 - [c101]Shai Halevi, Yuriy Polyakov, Victor Shoup:
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. CT-RSA 2019: 83-105 - [c100]Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shai Halevi:
Towards Deep Neural Network Training on Encrypted Data. CVPR Workshops 2019: 40-48 - [c99]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. TCC (1) 2019: 312-340 - [c98]Craig Gentry, Shai Halevi:
Compressible FHE with Applications to PIR. TCC (2) 2019: 438-464 - [i98]Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. IACR Cryptol. ePrint Arch. 2019: 176 (2019) - [i97]Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. IACR Cryptol. ePrint Arch. 2019: 425 (2019) - [i96]Craig Gentry, Shai Halevi:
Compressible FHE with Applications to PIR. IACR Cryptol. ePrint Arch. 2019: 733 (2019) - [i95]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i94]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. IACR Cryptol. ePrint Arch. 2019: 1032 (2019) - 2018
- [j15]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. Proc. Priv. Enhancing Technol. 2018(4): 104-124 (2018) - [c97]Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup:
Doing Real Work with FHE: The Case of Logistic Regression. WAHC@CCS 2018: 1-12 - [c96]Shai Halevi:
Advanced Cryptography: Promise and Challenges. CCS 2018: 647 - [c95]Shai Halevi, Victor Shoup:
Faster Homomorphic Linear Transformations in HElib. CRYPTO (1) 2018: 93-120 - [c94]Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Secure Multi-Party Computation. CRYPTO (2) 2018: 488-520 - [c93]Fabrice Benhamouda, Shai Halevi, Tzipora Halevi:
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation. IC2E 2018: 357-363 - [c92]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. TCC (2) 2018: 255-281 - [i93]Shai Halevi, Yuriy Polyakov, Victor Shoup:
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2018: 117 (2018) - [i92]Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup:
Doing Real Work with FHE: The Case of Logistic Regression. IACR Cryptol. ePrint Arch. 2018: 202 (2018) - [i91]Shai Halevi, Victor Shoup:
Faster Homomorphic Linear Transformations in HElib. IACR Cryptol. ePrint Arch. 2018: 244 (2018) - [i90]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. IACR Cryptol. ePrint Arch. 2018: 913 (2018) - [i89]Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. IACR Cryptol. ePrint Arch. 2018: 1235 (2018) - 2017
- [j14]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. Algorithmica 79(4): 1353-1373 (2017) - [c91]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation Without Correlated Randomness. ASIACRYPT (3) 2017: 181-211 - [c90]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. CCS 2017: 783-798 - [c89]Yilei Chen, Craig Gentry, Shai Halevi:
Cryptanalyses of Candidate Branching Program Obfuscators. EUROCRYPT (3) 2017: 278-307 - [c88]Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou:
Four Round Secure Computation Without Setup. TCC (1) 2017: 645-677 - [p2]Shai Halevi:
Homomorphic Encryption. Tutorials on the Foundations of Cryptography 2017: 219-276 - [i88]Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. IACR Cryptol. ePrint Arch. 2017: 104 (2017) - [i87]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. IACR Cryptol. ePrint Arch. 2017: 144 (2017) - [i86]Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou:
Four Round Secure Computation without Setup. IACR Cryptol. ePrint Arch. 2017: 386 (2017) - [i85]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation without Correlated Randomness. IACR Cryptol. ePrint Arch. 2017: 871 (2017) - [i84]Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2017: 1056 (2017) - 2016
- [j13]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5): 113-120 (2016) - [j12]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits. SIAM J. Comput. 45(3): 882-929 (2016) - [c87]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and Its Applications. CRYPTO (3) 2016: 93-122 - [c86]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. ITCS 2016: 157-168 - [c85]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Functional Encryption Without Obfuscation. TCC (A2) 2016: 480-511 - [e3]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - [i83]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and its Applications. IACR Cryptol. ePrint Arch. 2016: 272 (2016) - [i82]Yilei Chen, Craig Gentry, Shai Halevi:
Cryptanalyses of Candidate Branching Program Obfuscators. IACR Cryptol. ePrint Arch. 2016: 998 (2016) - 2015
- [c84]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access with HE-over-ORAM Architecture. ACNS 2015: 172-191 - [c83]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c82]Shai Halevi, Victor Shoup:
Bootstrapping for HElib. EUROCRYPT (1) 2015: 641-670 - [c81]Craig Gentry, Sergey Gorbunov, Shai Halevi:
Graph-Induced Multilinear Maps from Lattices. TCC (2) 2015: 498-527 - [i81]Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. IACR Cryptol. ePrint Arch. 2015: 114 (2015) - [i80]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i79]Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. IACR Cryptol. ePrint Arch. 2015: 845 (2015) - [i78]Shai Halevi:
Graded Encoding, Variations on a Scheme. IACR Cryptol. ePrint Arch. 2015: 866 (2015) - [i77]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. IACR Cryptol. ePrint Arch. 2015: 1173 (2015) - 2014
- [c80]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. CRYPTO (1) 2014: 518-535 - [c79]Shai Halevi, Victor Shoup:
Algorithms in HElib. CRYPTO (1) 2014: 554-571 - [c78]Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited. EUROCRYPT 2014: 405-422 - [c77]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - [c76]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. FOCS 2014: 404-413 - [c75]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-Round Secure MPC from Indistinguishability Obfuscation. TCC 2014: 74-94 - [i76]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited, Part I. IACR Cryptol. ePrint Arch. 2014: 82 (2014) - [i75]Shai Halevi, Victor Shoup:
Algorithms in HElib. IACR Cryptol. ePrint Arch. 2014: 106 (2014) - [i74]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. IACR Cryptol. ePrint Arch. 2014: 148 (2014) - [i73]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access With HE-over-ORAM Architecture. IACR Cryptol. ePrint Arch. 2014: 345 (2014) - [i72]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptol. ePrint Arch. 2014: 356 (2014) - [i71]Shai Halevi, William Eric Hall, Charanjit S. Jutla:
The Hash Function "Fugue". IACR Cryptol. ePrint Arch. 2014: 423 (2014) - [i70]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Fully Secure Attribute Based Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2014: 622 (2014) - [i69]Craig Gentry, Sergey Gorbunov, Shai Halevi:
Graph-Induced Multilinear Maps from Lattices. IACR Cryptol. ePrint Arch. 2014: 645 (2014) - [i68]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Fully Secure Functional Encryption without Obfuscation. IACR Cryptol. ePrint Arch. 2014: 666 (2014) - [i67]Shai Halevi, Victor Shoup:
Bootstrapping for HElib. IACR Cryptol. ePrint Arch. 2014: 873 (2014) - [i66]Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai:
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero. IACR Cryptol. ePrint Arch. 2014: 929 (2014) - 2013
- [j11]Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:
Field switching in BGV-style homomorphic encryption. J. Comput. Secur. 21(5): 663-684 (2013) - [c74]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118 - [c73]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Discrete Gaussian Leftover Hash Lemma over Infinite Domains. ASIACRYPT (1) 2013: 97-116 - [c72]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. CRYPTO (2) 2013: 479-499 - [c71]Sanjam Garg, Craig Gentry, Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices. EUROCRYPT 2013: 1-17 - [c70]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits. FOCS 2013: 40-49 - [c69]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using It Efficiently for Secure Computation. Privacy Enhancing Technologies 2013: 1-18 - [c68]Zvika Brakerski, Craig Gentry, Shai Halevi:
Packed Ciphertexts in LWE-Based Homomorphic Encryption. Public Key Cryptography 2013: 1-13 - [i65]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 128 (2013) - [i64]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using it Efficiently for Secure Computation. IACR Cryptol. ePrint Arch. 2013: 239 (2013) - [i63]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 422 (2013) - [i62]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. IACR Cryptol. ePrint Arch. 2013: 451 (2013) - [i61]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-round secure MPC from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 601 (2013) - [i60]Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
How to Compress (Reusable) Garbled Circuits. IACR Cryptol. ePrint Arch. 2013: 687 (2013) - [i59]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. IACR Cryptol. ePrint Arch. 2013: 860 (2013) - 2012
- [j10]Shai Halevi, Yael Tauman Kalai:
Smooth Projective Hashing and Two-Message Oblivious Transfer. J. Cryptol. 25(1): 158-193 (2012) - [c67]Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. CRYPTO 2012: 850-867 - [c66]Craig Gentry, Shai Halevi, Nigel P. Smart:
Fully Homomorphic Encryption with Polylog Overhead. EUROCRYPT 2012: 465-482 - [c65]Craig Gentry, Shai Halevi, Nigel P. Smart:
Better Bootstrapping in Fully Homomorphic Encryption. Public Key Cryptography 2012: 1-16 - [c64]Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. SCN 2012: 19-37 - [c63]Nir Bitansky, Ran Canetti, Shai Halevi:
Leakage-Tolerant Interactive Protocols. TCC 2012: 266-284 - [i58]Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. IACR Cryptol. ePrint Arch. 2012: 99 (2012) - [i57]Craig Gentry, Shai Halevi, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2012: 240 (2012) - [i56]